GE S2020 Technical Manual Download Page 66

Chapter 4 

– Functions

 

GE Reason Switches

 

 

66 

REASON SWITCHES-TM-EN-3 

 

When  it  comes  to  port  definition,  RSTP  has  changed  some  aspects  from  the  STP 
protocol.  While  in  STP  there  were  blocking,  disabled,  designated  and  root  ports,  in 
RSTP they are defined as alternate, backup, designated and root ports. 

Figure below exemplifies a topology after the RSTP protocol has identified all of the 
loops. 

 

Figure 25: RSTP port status in a loop topology 

Besides the difference in port states and definition, there are also two port definitions 
that are not used in the STP protocol and are used in the RSTP, which are called Edge 
and Link. 

Edge ports are connected to end nodes, e.g., IEDs or computers. Care must be taken 
when using an IED that is RSTP-aware, as it behaves as a bridge, it ports should not 
be treated as Edge ports. 

Trunk  ports  are  ports  connected  between  switches  with  RSTP.  The  figure  below 
shows these port types. 

 

Figure 26: RSTP edge and truck ports 

These definitions are used to increase the RSTP performance, as edge ports do not 
send  or  receive  BPDU  packets,  they  go  from  disabled  to  forwarding  state  without 
passing through other states. If an edge port starts receiving BPDU packets, it moves 
to trunk state and starts being a part of the RSTP protocol. 

Summary of Contents for S2020

Page 1: ...al Managed Ethernet Switches Technical Manual T1000 Platform Hardware Version A T1000 Platform Software Version 03 S20 Platform Hardware Version B S20 Platform Software Version 06 Publication Reference REASON SWITCHES TM EN 3 3 imagination at work ...

Page 2: ......

Page 3: ... 1 S2020 25 7 2 S2024G 26 7 3 T1000 27 Chapter 2 Safety Information 29 1 Health and Safety 29 2 Symbols 31 3 Installation Commissioning and Servicing 32 3 1 Lifting Hazards 32 3 2 Electrical Hazards 32 3 3 Fusing Requirements 34 3 4 Equipment Connections 34 3 5 Pre energisation Checklist 36 3 6 Peripheral Circuitry 37 3 7 Upgrading Servicing 37 4 Decommissioning and Disposal 38 Chapter 3 Hardware ...

Page 4: ...ogy 79 9 2 Virtual LAN Basics 80 9 3 LAN in Modern Power System Communication 83 9 4 IEEE 802 1Q Switch operation concepts 84 9 5 Reason Switches Operation 86 10 Quality of Service QoS 89 10 1 Quality of Service Basics 89 10 2 Class of Service CoS Bits QoS 91 10 3 Differentiated Service Code Point DSCP 94 10 4 GE Reason Switches QoS Capabilities 96 11 Mirroring 101 12 Precision Time Protocol PTP 1...

Page 5: ...ngs 142 4 1 General Security Settings 142 4 2 SNMP Setting 149 5 Aggregation Settings 157 5 1 Static Aggregation Setting 157 5 2 LACP Settings 158 6 Loop Protection Settings 160 7 Spanning Tree Settings 162 8 IPMC Setting 171 8 1 IPMC Profile 171 8 2 IPMC 174 9 MAC table Settings 183 10 VLAN Settings 185 11 QoS Settings 190 11 1 Port Classification 190 11 2 Port Policing 192 11 3 Queue Policing 19...

Page 6: ...ew 257 1 1 Highlights 257 1 2 Human Machine Interface Descriptions 261 2 Mounting 263 2 1 Rack Mounting 263 2 2 Panel and Rail Mouting 264 3 Power Connections 266 4 Communications Ports 267 4 1 Electrical Ethernet Ports RJ45 267 4 2 Fixed Fiber Optics Transceiver FDDI 267 4 3 SFP Pluggable Transceiver 268 5 Dry Contact Alarm Failsafe 270 6 Preventive Maintenance Actions 271 6 1 Preventive Actions ...

Page 7: ...ed 294 4 RJ45 Ethernet 10 100 1000 Mbps Port 295 5 Optical Transceivers 100 1000 Mbps 296 6 Operating Environment 297 7 T1000 Dimensions 298 8 S2020 and S202G Dimensions 299 9 Ingress Protection 300 9 1 Front Mounting 300 9 2 Rear Mounting 300 9 3 Pollution Degree 300 10 Insulation EMI and Environmental Tests 301 10 1 Insulation Tests 301 10 2 Type Tests 301 ...

Page 8: ... B 60 Figure 17 Example of a loop topology showing bridge 61 Figure 18 Logical topology after the Spanning Tree protocol was executed 61 Figure 19 Port states in the Spanning Tree Protocol 62 Figure 20 STP protocol mechanism and maximum port changing time 63 Figure 21 Port states when STP protocol is used in a ring physical topology 64 Figure 22 Failure on the designated link of the Spanning tree ...

Page 9: ...4 Figure 48 Traffic flow inside an 802 1Q switch 85 Figure 49 Traffic in an oversized 90 Figure 50 Traffic of incoming data higher than the port at the switch can process 90 Figure 51 Network with prioritization of traffic 91 Figure 52 CoS bits inside and 802 1Q frame 92 Figure 53 Traffic type acronyms show in section l 4 on the IEEE 802 1Q 92 Figure 54 CoS classification as shown in IEC 61850 90 ...

Page 10: ...Main menu at the Telnet interface 125 Figure 79 Ethernet RJ45 connector at Reason Switches 126 Figure 80 Example of HTTP or HTTPS first screen at a given web browser 127 Figure 81 DPL level usage 212 Figure 82 Topology to be configured in a VLAN environment 221 Figure 83 Topology to be configured in a RSTP environment 230 Figure 84 Topology to be configured in a PTP environment 231 Figure 85 RJ45 ...

Page 11: ...Figure 97 T1000 dimensions 298 Figure 98 S2020 and S2024G dimensions 299 ...

Page 12: ......

Page 13: ...efore be very pleased to hear from you if you discover any errors or have any suggestions for improvement Our policy is to provide the information necessary to help you safely specify engineer install commission maintain and eventually dispose of this product We consider that this manual provides the necessary information but if you consider that more details are needed please contact us All feedb...

Page 14: ...the following changes of nomenclature however British English is used throughout this manual The British term Earth is used in favour of the American term Ground 1 3 Acronyms and Abbreviations BC Boundary Clock BPDU Bridge Protocol Data Unit CSMA CD Carrier Sense Multiple Access with Collision Detection CPU Central Processing Unit CoS Class of Service IEC TR 61850 90 4 Communication networks and s...

Page 15: ...Interface to Instrument Transformers using IEC 61850 9 2 IEEE Institute of Electrical and Electronics Engineers IED Intelligent Electronic Device IRIG Inter Range Instrumentation Group IEC International Electrotechnical Commission ICMPv6 Internet Control Message Protocol version 6 IGMP Internet Group Management Protocol IP Internet Protocol IPMC IP Multicast LED Light Emitting Diode LLDP Link Laye...

Page 16: ...odel P2P Peer to peer PPE Personal Protective Equipment PDC Phasor Data Concentrator PMU Phasor Measurement Unit PVID Port VLAN Identifier PTP Precision Time Protocol IEEE 1588 PCP Priority Code Point PCT Protective Conductor Terminal PPS Pulse per second QoS Quality of Service R TTE Radio and Telecommunications Terminal Equipment RSTP Rapid Spanning Tree Protocol IEEE 802 1D RADIUS Remote Authent...

Page 17: ...twisted pair UDP User Datagram Protocol VLAN Virtual LAN IEEE 802 1Q VID VLAN Identifier WRED Weighted Random Early Detection WAMS Wide Area Monitoring System CLI Command Line Interface PDU Protocol Data Units CIST Common Internal Spanning Tree DPL Drop Precedence Level PCP Priority Coded Point DEI Drop Eligible Indicator DP Drop Precedence QCE QoS Control Entry QCL QoS Control List LACP Link Aggr...

Page 18: ... loop based topologies such as ring topology can be monitored and reconfigured using the RSTP IEEE 802 1D protocol Packet switched transmission in the switches is totally done by hardware which ensures agility and maximum reliability even when interconnecting IEDs to distinct interfaces and speeds The switches configuration may be done through interactive mode of text commands SSH and Telnet or in...

Page 19: ...ease contact GE immediately see contact information at the beginning of this manual Examine the equipment for any shipping damage If the unit is damaged or fails to operate notify the shipping company immediately Only the consignee the person or company receiving the unit can file a claim against the carrier for occasional shipping damages We recommend that the user retain the original packing mat...

Page 20: ...rts or up to 16 Fast Ethernet ports plus 4 Gigabit ports The ports are in a module containing 4 ports each which support copper Ethernet communication or LC connector Optical Fiber links multimode or single mode optical fiber S2020 only supports NTP synchronization protocol client operation If PTP is required refer to T1000 or S2024G 4 3 S2024G The S2024G is a managed gigabit Ethernet switch desig...

Page 21: ...uthorization through RADIUS and TACACS Remote monitoring through RMON SNMP v1 v2c v3 traffic mirroring and monitoring functions IP multicast management through IGMP v2 v3 for IPv4 applications and MLD v1 v2 for IPv6 applications VLAN traffic segregation IEEE 802 1Q and up to 4095 VLANs allowed Traffic prioritization up to 8 Class of Service levels using QoS IEEE 802 1Q Loop detection and protectio...

Page 22: ...8v2 compliant Precision Time Protocol PTP at all ports except on S2020 PTP operation as Transparent Clock TC P2P or E2E delay mechanism calculation or Boundary Clock BC USB 2 0 communication port for local configuration Dry contact relay for external signalization failsafe alarm ...

Page 23: ...IEC 60255 27 2013 was used to establish conformity Protective Class IEC60255 27 2013 Protective Class 1 This equipment requires a protective conductor ground to ensure user safety Installation category IEC 60255 27 2013 Installation category III Overvoltage Category III Equipment in this category is qualification tested at 5kV peak 1 2 50 µS 500 Ohms 0 5 J between all supply circuits and ground an...

Page 24: ...ction 24 REASON SWITCHES TM EN 3 6 4 R TTE Compliance R TTE Radio and Telecommunications Terminal Equipment directive 99 5 EC Conformity is demonstrated by compliance with both the EMC directive and the Low Voltage directive to zero volts ...

Page 25: ...o 1 Gbps LC type connector multi mode fiber 1000BASE SX Ethernet for up to 0 5 km K Two 1 Gbps RJ45 SFP Transceivers 10 100BASE TX 1000BASE T Ethernet ports Two 100 Mbps LC type connector multi mode fiber 100BASE FX Ethernet for up to 2 km L Two 1 Gbps LC type connector multi mode fiber 1000BASE SX Ethernet for up to 0 5 km Two 100 Mbps LC type connector multi mode fiber 100BASE FX Ethernet for up...

Page 26: ...e mode fiber 1000BASE LX Ethernet for up to 10 km D Four 1 Gbps LC type connector single mode fiber 1000BASE ZX Ethernet for up to 40 km E Four 1 Gbps LC type connector single mode fiber 1000BASE ZX Ethernet for up to 80 km F Four 100 Mbps LC type connector multi mode fiber 100BASE FX Ethernet for up to 2 km H Four RJ45 copper 10 100BASE TX I Four 1 Gbps RJ45 SFP Transceivers 10 100BASE TX 1000BAS...

Page 27: ...100BASE TX 1000BASE T Ethernet ports A Two slots for SFP transceivers B Two 1 Gbps LC type connector multi mode fiber 1000BASE SX Ethernet for up to 0 5 km C Two 1 Gbps LC type connector single mode fiber 1000BASE LX Ethernet for up to 10 km D Two 1 Gbps LC type connector single mode fiber 1000BASE ZX Ethernet for up to 40 km E Two 1 Gbps LC type connector single mode fiber 1000BASE ZX Ethernet fo...

Page 28: ...fiber 1000BASE ZX Ethernet for up to 40 km E Two 1 Gbps LC type connector single mode fiber 1000BASE ZX Ethernet for up to 80 km F Two 100 Mbps ST type connector multi mode fiber 100BASE FX Ethernet for up to 2 km G Two 100 Mbps LC type connector multi mode fiber 100BASE FX Ethernet for up to 2 km H Two 1 Gbps RJ45 SFP Transceivers 10 100BASE TX 1000BASE T Ethernet ports Not CE marked J Not instal...

Page 29: ...oltages are present in certain parts of the equipment Improper use of the equipment and failure to observe warning notices will endanger personnel Only qualified personnel may work on or operate the equipment Qualified personnel are individuals who are familiar with the installation commissioning and operation of the equipment and the system to which it is being connected familiar with accepted sa...

Page 30: ...EN 3 of questions or problems do not take any action without proper authorisation Please contact your local sales office and request the necessary information Each product is subjected to routine production testing for Dielectric Strength and Protective Bonding Continuity ...

Page 31: ...mentation Failure to do so could result in damage to the equipment Risk of electric shock Ground terminal Note This symbol may also be used for a protective conductor ground terminal if that terminal is part of a terminal block or sub assembly Protective conductor ground terminal Both direct and alternating current Instructions on disposal requirements The term Ground used in this manual is the di...

Page 32: ... Personal Protective Equipment PPE to reduce the risk of injury 3 2 Electrical Hazards All personnel involved in installing commissioning or servicing this equipment must be familiar with the correct working procedures Consult the equipment documentation before installing commissioning or servicing the equipment Always use the equipment as specified Failure to do so will jeopardise the protection ...

Page 33: ...ecting test leads If the equipment is used in a manner not specified by the manufacturer the protection provided by the equipment may be impaired Operate the equipment within the specified electrical and environmental limits Before cleaning the equipment ensure that no connections are energised Use a lint free cloth dampened with clean water Integration of the equipment into systems shall not inte...

Page 34: ...f type C 10A rating compliant with IEC 60947 1 and IEC 60947 3 may be used Digital input circuits should be protected by a high rupture capacity NIT or TIA fuse with maximum rating of 10 A or equivalent MCB as above For safety reasons current transformer circuits must never be fused Other circuits should be appropriately fused to protect the wire used Reason devices contain an internal fuse for th...

Page 35: ...ated crimp terminations for voltage and current connections Always use the correct crimp terminal and tool according to the wire size In order to maintain the equipment s requirements for protection against electric shock other devices connected to Reason Switches shall have protective class equal or superior to Class 1 Watchdog self monitoring contacts are provided to indicate the health of the d...

Page 36: ... inductance and be as short as possible All connections to the equipment must have a defined potential Connections that are pre wired but not used should be earthed or connected to a common grouped potential Pay extra attention to diagrams before wiring the equipment Always be sure that the connections are correct before energizing the circuits 3 5 Pre energisation Checklist Check voltage rating p...

Page 37: ...he line CT before opening any connections to it Reason devices DO NOT feature any automatic CT shorting feature Therefore external shorting of the CTs is mandatory Check the equipment documentation and wiring diagrams carefully 3 7 Upgrading Servicing Do not insert or withdraw modules PCBs or expansion boards from the equipment while energized as this may result in damage to the equipment Hazardou...

Page 38: ...y dc supply The auxiliary supply input may have capacitors in parallel which may still be charged To avoid electric shock discharge the capacitors using the external terminals before decommissioning Avoid incineration or disposal to water courses Dispose of the equipment in a safe responsible and environmentally friendly manner and if applicable in accordance with country specific regulations ...

Page 39: ...ion port HMI board consisting of LEDs to indicate port activity and speed and a Reset button only in T1000 used to manually restart switches manually Communication modules The failsafe relay board and HMI board are connected to the main processor module by flat cables Communication modules are connected directly to the main processor module T1000 switches are built with a board and connector that ...

Page 40: ...are architectures the equipment housing is composed by metalwork where the boards are fixed After mounting a cover is mounted in the top side of the equipment GE Reason Switches are 19 rack mounting with 1U high 44 45 mm and a depth of 310 mm The case is pre finished steel painted with epoxy paint Figure 2 T1000 Switch Figure 3 S2020 Switch ...

Page 41: ...Chapter 3 Hardware Design GE Reason Switches REASON SWITCHES TM EN 3 41 Figure 4 S2024G Switch ...

Page 42: ...GE Reason Switches Chapter 3 Hardware Design 42 REASON SWITCHES TM EN 3 3 Hardware Architecture Figure 5 Hardware architecture overview ...

Page 43: ...odules the available Ethernet communication ports for the S2020 are Connection Transfer Rate Number of Interfaces RJ45 10 100 BASE TX 4 ports per module SFP 100BASE FX 4 ports per module S2020 switch also allows up to 4 Gigabit interfaces 1000BASE TX or 1000BASE FX at the module 01 first communication module position The remaining 16 interfaces divided in four communication modules must be Fast Et...

Page 44: ... 61850 networks This chapter describes an overview of this common functions and protocols as well as providing information to be used when designing the network and configuring the equipment 1 System management 1 1 System Information Management information can be used for the user s personal purposes and management protocols will check these following fields to fill the information used in each pr...

Page 45: ...s more than one IP for the Web Interface the Router mode could be used In this mode the switch will route the requirements for access in different IP network Thus in Router mode it is possible to access the equipment using more than one IP When using the Router function it is necessary to define manually the IP Routes basically divided in Network and Gateway addresses If the application requires t...

Page 46: ...five NTP time servers Time information is used by some protocols such as syslog to timestamp the messages In power system applications the general time server is a GNSS synchronized clock Stratum 0 precision 1 4 Time zone The internal clock of Reason Switches can be synchronized using NTP protocol which sends the UTC time Greenwich Mean Time When using the equipment in other regions the timezone m...

Page 47: ...n RFC 5426 and this document specifies that at least the 514 UDP port must be used for syslog applications Other ports if applicable should be configurable Reason Switches can send log messages to a dedicated log server The syslog level is divided in 4 categories error severity 3 warning severity 4 notice severity 5 and informational severity 6 When choosing higher severity levels the equipment wi...

Page 48: ...MA CD protocol to prevent collisions to full duplex mode Thus newer technologies are also developed to deal with legacy equipment Reason Switches can perform automatic negotiation auto negotiation for copper connections or defined by the optical transceiver or manual negotiation When in manual negotiation it is possible to define from Ethernet 10 Mbps Fast Ethernet 100 Mbps or Gigabit Ethernet 1 G...

Page 49: ...518 bytes Ethernet frame without 802 1Q tag to 10 056 bytes If the network operates in half duplex mode with a high level of collisions it is possible to configure the action that the switch will take in this event It is allowed to choose discard frame or restart backoff algorithm after 16 collisions ...

Page 50: ...ite user standard user Level 15 read write and software management user administrator The authentication method used to access the switch can be performed locally or remotely and the choice depends on network requirements The equipment allows to select an authentication type for each of the access protocols Thus it is possible to select a different authentication method for console interface telne...

Page 51: ...such as the RFC 1157 A Simple Network Management Protocol or RFC 3418 Management Information Base MIB for the Simple Network Management Protocol When using this protocol it is important to list relevant RFC documentation to the application SNMPv1 SNMPv2c and SNMPv3 protocols are available SNMPv1 was the first created and SNMPv3 was the latest version of the management protocol Reason Switches supp...

Page 52: ...n asynchronous message received from an agent is called Trap message When SNMP information must be sent through the network the agent will search at its own library of SNMP protocol information to search whether the request done by the manager can be satisfied An Information library is called Management Information Base MIB Both manager and agent must have MIB libraries at its own hardware to unde...

Page 53: ...link speed generally is not the major difficulty when upgrading a LAN As network devices are getting less expensive upgrading the devices to a higher speed device is generally possible Besides when it comes to redundancy the aggregation function can have grate benefits to a given connection between two stations As the behavior of two links will be as if they are one there will be redundancy in the...

Page 54: ...y will create loops in the network it is recommended to configure both switches before enabling the ports used To use this function both network equipment connected must be aware to perform aggregation Besides aggregated ports must be at the same aggregation group ID Reason Switches can create up to six groups and the maximum allowable ports for one group are the number of ports each switch have A...

Page 55: ...e ports is 300 Mbps there are only 170 Mbps being used and one of the links is not forwarding any traffic Even though there is one port available if MAC address A or B requires more bandwidth the extra traffic will be generated on ports already used Finally Aggregation can only be used by ports which have the same speed capability i e fast Ethernet ports can be aggregated to create a 200 Mbps link...

Page 56: ...re three main problems Unicast frame duplication Multicast frame flooding Address table non convergence If the Data Sender starts transmitting data to the Receiver switch A will understand that the Receiver is in two different ports and thus will send data through both ports Switch B will map MAC address of the Receiver at two ports and thus will send it from both This behavior will insert duplica...

Page 57: ...uirement in networks The redundant path is possible due to the usage of redundancy or loop resolution protocols For loop resolution the most common is Spanning Tree protocols and for link redundancy the Link Aggregation protocol 5 2 Loop Protection Reason Switches support detection and protection from a network loop in two ways using spanning tree protocols or using the Loop Protection function Th...

Page 58: ...n off if a loop is detected Besides each port can be freely set to have the function enabled and send or not loop detection packets If a loop is detected there are three actions allowed Shutdown port Shutdown and log Log only If the Log option is enabled a log server must be configured to send the log messages informing the loop detection of a given port must be set ...

Page 59: ...owing sections This chapter contains the following sections Spanning Tree fundamentals STP protocol RSTP protocol MSTP protocol 6 1 Spanning Fundamentals The need of a protocol to solve problem of loops in Ethernet networks started at the beginning of the commercial usage As loops were required for better reliability of networks and loop free topologies are difficult to maintain automatic loop det...

Page 60: ...tch and there may be multiple designated ports To decide which switch will be the root an election occurs between all Spanning Tree aware switches in a given LAN Every switch has a bridge identifier which contains information regarding the switch generally the MAC address of the first Ethernet port and the priority of the bridge Bridges with lower priority number will have preference when the elec...

Page 61: ...e In the example the lowest bridge identifier is the Bridge 001 Thus this switch will be the root bridge The path that will be used to send data over the network will be defined based on the path cost from the root bridge to the last node If traffic from IED A to IED B goes through bridges 001 and 500 the total cost will be 104 However if traffic from IED A to IED B goes through bridges 001 050 an...

Page 62: ...and then the port will forward traffic as a common switch port The figure below demonstrates such steps from the disabled to the forwarding state Figure 19 Port states in the Spanning Tree Protocol Over the years the protocol has evolved After the first version of the Spanning Tree Protocol STP Rapid STP protocol was created to improve response time When VLANs were introduced Multiple STP protocol...

Page 63: ...ble that changing from blocking to forwarding state takes up to 50 seconds considering the maximum time allowed As conclusion a topology change will be detected and corrected in dozens of seconds when the STP protocol is used Generally these timers are user configurable and then it is possible to change period of sending and receiving messages to increase its performance By default Reason switches...

Page 64: ...REASON SWITCHES TM EN 3 Figure 21 Port states when STP protocol is used in a ring physical topology Figure 22 Failure on the designated link of the Spanning tree Figure 23 Reconfigured topology after a designated link failure 6 3 RSTP Protocol ...

Page 65: ...losophy such as the election of root bridge but it has added some new characteristics and concepts to the STP protocol The figure below shows the expected port behavior when using RSTP Figure 24 RSTP protocol mechanism The table below illustrates the port state behaviour over the RSTP protocol Port state Send BPDU Receive BPDU Forward frames Learn MAC addresses Disabled Yes Yes No No Learning Yes ...

Page 66: ...that are not used in the STP protocol and are used in the RSTP which are called Edge and Link Edge ports are connected to end nodes e g IEDs or computers Care must be taken when using an IED that is RSTP aware as it behaves as a bridge it ports should not be treated as Edge ports Trunk ports are ports connected between switches with RSTP The figure below shows these port types Figure 26 RSTP edge ...

Page 67: ...m an inferior bridge it assumes that the connection to the root has been lost and a reconfiguration of the topology is needed Finally in the RSTP protocol each bridge that is in the topology starts sending BPDU packets based on the hello time of the frame s transmission RSTP aware bridges can send BPDU without receiving it from a root bridge If the bridge stops receiving BPDU packets from designat...

Page 68: ... region MSTI configuration name MSTI configuration revision VLANs mapped to the MSTI It is defined that bridges are at the same region if they have the same configuration name revision and the same VLANs mapped The figure below shows an example of the MSTP instance regions Figure 28 MSTP regions and legacy RSTP LAN connection Each region will have its own root switch as it behaves as a separate sp...

Page 69: ...overy time performance and reduce packet loss during faults in the network With UltraRSTP fault recovery times of less than 5ms per hop are achieved while maintaining compatibility with standard RSTP for interoperability with commercial switches To improve the recovery performance Reason switches implement a hardware interruption to ensure the highest priority in reconfiguring RSTP As such all swi...

Page 70: ...ircuit being defined maximum 15 characters No editing allowed The VOLTAGE CIRCUIT scroll box allows user to select a code of the voltage circuit to be used The CURRENT CIRCUIT scroll box allows user to select a code of the current circuit to be used Figure 31 RSTP recovery table Figure 32 Network fault recovery using GE Reason Switches ...

Page 71: ...es and PTP messages are mapped directly at the Ethernet frame and the Multicast mechanism is assured by its MAC address destination This means these messages cannot be directly routed e g they cannot be transmitted in their original form over WANs and they are sent to a MAC address which is not the end node MAC address but the multicast MAC address The figures below illustrate unicast broadcast an...

Page 72: ...ks more specifically IPv4 networks The second version of the protocol was defined at RFC 2236 and its last version is the IGMPv3 defined at RFC 3376 In internet context common applications that require multicast transmission are video and audio streaming When it comes to power systems communication IGMP protocol can be used when there is multicast communication between Phasor Measurement Unit PMU ...

Page 73: ... are private addresses and cannot be routed Reserved addresses cannot be used as IP multicast addresses In addition to the addresses shown above there are common services such as PTP multicasting and NTP multicasting that have specific addresses Be sure that they re not used when configuring an IP Multicast group at the network IGMP snooping function is performed by the switches by reading the IP ...

Page 74: ... through RFC 3810 Its usage is much like IGMP but instead of multicast transmission over IPv4 networks MLD works over IPv6 networks Protocol mechanism is very similar to IGMP To be part of a group that is receiving a multicast data from a sender the MLD receiver must send a join group message which must be understood by MLD aware layer 2 switches such as Reason Switches and routers at the network ...

Page 75: ... IP addresses can be FF00 8 address block is reserved for multicast Like at the IGMP protocol there are addresses which are defined and cannot be used as a multicast address FF01 1 All nodes in local interface address used by hosts FF02 2 All in local link address used by hosts FF02 5 All nodes in local site address used by routers Reserved addresses cannot be used as IP multicast addresses In add...

Page 76: ...scarded by the switch Multicast forwarding o A multicast addressed frame must be forwarded to all interfaces except the incoming frame interface If one of these concepts is violated the network would not work properly Reason Switches by default are set to operate as a transparent bridge i e as a common switch An example of the Ethernet frame is shown in Figure 35 below Figure 37 Ethernet frame As ...

Page 77: ... interface where the destination is attached and no data will be sent to other interfaces as shown below If there is incoming data to a host not mapped as destination the switch may flood the ports connected to other switching equipment or drop the packets Figure 39 Forwarding traffic in an Ethernet switch As networks are not static and hosts can be connected and disconnected any time the switch m...

Page 78: ...ossible for security reasons to restrict the access to a switch s LAN by manually inserting MAC addresses of the allowed hosts at a given interface In this case the port will operate in secure mode and the equipment will only forward traffic from set MAC addresses and will drop data from MAC addresses which are not set Thus it is possible to limit LAN access only by MAC addresses The following fig...

Page 79: ...each department All traffic between them should be routed This issue would not be a problem if the hosts were static which is not a common behaviour There are new people joining the LAN mobile users and new changes in organization infrastructure and so on As an example imagine the organization shown in below Departments A and B are located in different rooms and each department s LAN is physically...

Page 80: ...c segregation of GOOSE Sampled Values and PTP messages would be done through different physical LAN installation This option would likely be unacceptable due to installation costs and maintenance difficulties 9 2 Virtual LAN Basics Virtual LAN technology allows separating the network through logical and physical networks With VLAN information it is possible to create logical networks based on its ...

Page 81: ...hey were at the same physical LAN as shown in the next figure Thus there is no more dependency on the equipment connections With VLAN it is possible to logically group hosts or messages with common interests Figure 44 Logical topology of the addition of new hosts with VLAN aware equipment Traffic segregation through Virtual LAN VLAN is standardized by IEEE 802 1Q document The standard added 4 byte...

Page 82: ...ed Description given in this manual applies to Customer tag C tag the most common VLAN usage in power system communication As Reason Switches main application is be a path to interconnect IED equipment in power systems communication information contained in this manual should be enough to use the equipment If application of switch requires the usage of specific VLAN for trunk links where S tag is ...

Page 83: ... are forwarded only onto the VLAN that the multicast message belongs to Thus GOOSE Sampled Values and PTP traffic will flow separately from each other Finally as the traffic is separated IED equipment that expects to receive only GOOSE messages will not have its network interface interrupted by Sampled Values data for example An example of expected VLAN traffic segregation is shown below Note that...

Page 84: ... when using VLAN traffic segregation is shown below Figure 47 Logical topology of typical power system communication environment IEC 61850 documents recommend to use different methods of redundancy at Station and Process communication bus For simplification these redundancy requirements are not shown nor discussed in this chapter 9 4 IEEE 802 1Q Switch operation concepts ...

Page 85: ...coming frame is from a not allowed VLAN it will be discarded Besides if the packet is a priority tagged frame or an untagged frame ingress filtering rules will map the frame to the VLAN which the port is a member 802 1Q switches always operate in VLAN mode When incoming frames have no VLAN information or applications does not require VLAN usage switch will encapsulate the frame on an 802 1Q frame ...

Page 86: ...s and untagged traffic will be redirected to the VLAN set in Port VLAN At the egress by default untagged incoming frames will be forwarded without VLAN tag as it has come to the switch Port Operation Mode Operation mode can be defined as Access Trunk or Hybrid port Access port is used when legacy equipment is connected Legacy equipment may be VLAN unaware equipment and customer VLAN tag equipment ...

Page 87: ... These are common tagged frames such as incoming GOOSE messages Thus when using equipment that sends tagged frames this is the port type that needs to be used Incoming frames with VLAN information will be directed to the VLAN and priority tagged or untagged frames are directed to Port VLAN Service tag port S Port is a port that expects to deal with double tagged frames Double tagged frames are fra...

Page 88: ...d Attention is required when using meshed VLAN and VLAN unaware equipment in the same port If the application imposes this use different VLAN identifiers in VLAN aware equipment from PVID number which will be used only for VLAN unaware equipment and then choose untag PVID at the egress tagging If the same identifier is used on both VLAN aware and unaware equipment all frames with PVID send to the ...

Page 89: ...network cannot flow this could cause undesired behaviour as traffic will be lost There are many ways to do traffic prioritization in different layering protocols and these philosophies are generally referred as Quality of Service QoS This chapter will focus on the CoS Class of Service bits usage over 802 1Q Ethernet frames which is one kind of QoS As shown in the VLAN chapter 802 1Q frames include...

Page 90: ...port at the switch can process This situation can have its impact decreased if communication protocol is connection oriented as there will be retransmission of packet if there is no confirmation by the receiver that data has reached its destination At power system communication there is a wide use of connectionless communication protocols that is protocols that does not guarantee the delivery of s...

Page 91: ...If lower priority data reach its bandwidth there will be lost of data but the higher priority data will not be affected as it has guarantee of bandwidth Figure below shows an example of such situation Figure 51 Network with prioritization of traffic There are several ways to separate prioritized traffic from general purposes traffics At data link layer there are the Priority bits in 802 1Q frame t...

Page 92: ...c shown in the figure below One important point is that the value 1 is the lowest priority mark Legacy equipment which does not support 802 1Q frames is understood as priority number 0 Priority 0 at the standard is mapped as Best effort quality above the number 1 This ensures that legacy equipment traffic would not be always treated as background traffic when mixed to 802 1Q aware equipment In add...

Page 93: ...D equipment in power system communication must allow the usage of VLAN mechanisms and traffic prioritization at least to digital GOOSE analogue Sampled Values and synchronization PTP packet messages separately as they are mapped directly at the data link layer Thus QoS mechanism with CoS bits would be enough to guarantee prioritization for these messages as the VLAN ID can be mapped directly to me...

Page 94: ...exploded as Differentiated Service Code Point DSCP bits are inside this field DSCP is a 6 bit length field that allows the IP header to carry prioritized information of the incoming data just as the CoS bits do in an 802 1Q frame In addition there are two remaining bits the Explicit Congestion Notification ECN bits defined in the RFC 3168 document Those last fields ECN bits allow the IP packets to...

Page 95: ...data and the Best Effort class DSCP value 0 for legacy equipment with no DSCP priority information Figure 57 List of DSCP code point field values shown in section D 2 9 of the IEC 61850 90 4 Technical Report Figure 58 Example of DSCP to CoS mapping shown in section D 2 9 of the IEC61850 90 4 Technical Report If the application does not have a special reference to be used the table below can be use...

Page 96: ...configuration as default configuration ensures that CoS value is queued correctly This means also to IP communication sending DSCP bits value which is informing the IP network equipment its priority over the network Thus if there is no legacy equipment without CoS capabilities configuration might not be necessary In addition strict priority is generally enough to ensure QoS services Thus using wei...

Page 97: ... CoS queues and are divided in Port Scheduler and Port Shaping functions CoS 6 and CoS 7 priorities queues operate only in strict priority mode Port scheduler functions allow the user to set a weight value to prioritize some of them based on average calculations Thus at instantaneous point of view there will be some transmission of lower queues traffic but the average traffic of higher CoS queues ...

Page 98: ...m specified at a given LAN the switch can search for traffic or addresses involved to map them as a specific QoS queue CoS value and DSCP value making a real traffic prioritized function If for any reason IED or hosts at a given network do not allow to configure specific messages to the VLAN this mechanism can be used to ensure types of message prioritization over other ones Reason Switches can pe...

Page 99: ...red independently to limit bandwidth in Unicast Multicast and Broadcast messages Finally if strict priority has not the performance required at a given LAN then Weighted Random Early Detection WRED function can be used as a method to discard frames based on previous assumptions To choose which frame could be dropped in this mechanism it is used the DEI bits in an 802 1Q frame Thus packets with DEI...

Page 100: ...opped Thus if the average filling level of a given queue gets closer to 100 the drop probability will get closer to the drop probability specified The selections of the DP levels are made at the port classification where each port has a specific DPL drop precedence level which can be used DPL equal 0 means that no packet should be used at the election and 1 2 or 3 will select which queue will be u...

Page 101: ... Mirroring Being Executed by a Switch Reason Switches have port mirroring function capabilities which can be basically executed in two ways Port mirroring in the same switch Port mirroring in different switches Port mirroring in the same switch as it says itself is executed in just one switch that shall be configured to Mirror type Mirrored port and port used to output mirrored data are in the sam...

Page 102: ... switch will be configured as the data collector of the data monitor flow The port that is desired to monitor will be enabled to be mirrored and the port that will send the data to the monitor flow will be selected as a reflector port For this operation only copper UTP cables and RJ45 connectors ports can operate as reflector ports In Intermediate type of operation the switch will operate as a nod...

Page 103: ...GE Reason Switches Chapter 4 Functions REASON SWITCHES TM EN 3 103 Figure 64 Data Monitor Flow Network ...

Page 104: ... PTP function in Reason Switches 12 1 Timing Requirements for Power System Applications Precise timing to be used by IED in a substation has grown its importance over the years Legacy equipment does not allow the operators and analysers to have as much information as nowadays as they are not allowed to perform high automation levels and their main application was as stand alone equipment After the...

Page 105: ...2 2 Precision Time Protocol PTP Functional Precision Time Protocol PTP uses the Ethernet frames to transport synchronism messages to do time synchronization of several IED connected to the network The protocol itself allows to be used layer 2 Multicast transport mechanism or layer 3 UDP transport mechanism messages which the chosen one will remain on the application requirements Although PTP proto...

Page 106: ...ains which can be the GMC clock or the boundary clock Ordinary Clock OC A clock in the PTP network which can be either master or a slave clock If the ordinary clock is a master clock it can be the master or the grand master clock of the network Transparent Clock TC A clock that forwards Sync messages with value of the forwarding process delay included at the message Boundary Clock BC A clock that ...

Page 107: ...aware that is the time stamping process happens directly at the hardware the equipment will operate without Follow up messages Besides if the time stamping process is done at the software level the equipment will then operate as a two step mode Thus in two step mode the TC will store the time stamp of the received Sync frame and will forward it without correction After the Sync message the TC will...

Page 108: ...on Switches may be a master in a given PTP subdomain Delay mechanism for the incoming messages from the Grand Master in the network can be either P2P or E2E delay mechanism Reason Switches can operate simultaneously in BC and TC mode being synchronized by a Grand Master in a given network and then synchronizing its own PTP subdomain Thus it can operate in HC mode mixing both modes explained before...

Page 109: ...Although the parameters of internal PTP clocks are configurable it is not recommendable to change their values At the Ports Configuration link inside the Clock instance configuration it is possible to set which delay mechanism will be used in a given port p2p or e2e Except for this selection there is no need to change others configuration parameters to PTP be properly operated by the switch ...

Page 110: ... Green colour means Gigabit port speed o Orange colour means 100 Mbps port speed TX LED Indicates transmission of data If on there is transmission of data from the port and if off there is no transmission RX LED Indicates receive of data in the port If on there is reception of data in the port and if off there is no reception Figure 68 HMI LED matrix of T1000 Switches For S2020 and S2024G switches...

Page 111: ...number 1 is energized Power 2 LED Indicates that power supply number 2 is energized Sync LED Indicates that internal PTP clock is synchronized when in Boundary PTP mode Failsafe LED Indicates that failsafe relay state changed that is normally open contact closed and normally closed contact opened Figure 69 HMI LED matrix of S2020 and S2024G Switches ...

Page 112: ...ecessity of being connected through a configuration interface When pressed the system will be rebooted and after a few seconds the system will be operating normally If configuration at a given switch is not saved at the start up configuration the reboot will discard this configuration the running configuration After reboot the start up configuration will be operating Figure 70 Reboot button ...

Page 113: ...p the switch Disconnect Ports 1 and 2 If the switch is powered on Connect Ports 1 and 2 creating a loop at the switch Do a reboot at the system with port 1 and 2 connected to each other The reboot could be done in the Web Interface or using the Reboot button only in T1000 Disconnect Ports 1 and 2 After a few seconds the system will be operating at its factory default configuration Factory default ...

Page 114: ...er supplies These signalizations can be useful as it occurs independently of the Ethernet medium increasing reliability The configuration is via Web configuration interface and possibilities are Port removal to signalize when any connected Ethernet port has lost its connection Power supply failure to signalize when the unit loose one of its power supplies By default failsafe relay is disabled One ...

Page 115: ...ommunication interfaces Local interface o USB 2 0 communication port for local configuration Protocols for this interface are Telnet or SSH protocol Remote interfaces o Ethernet interface communication Electrical or Optical for remote or local monitoring and configuration Protocols for this interface are HTTP HTTPS SSL SSH and Telnet ...

Page 116: ... HTTPS interfaces can be used through Ethernet electrical or optical connections To be accessed it is necessary to know the equipment IP If used this interface requires a computer with web navigation software to communicate with Reason Switches An example of the first screen interface when accessed by these protocols is shown below Figure 72 Example of HTTP or HTTPS first screen at a given web bro...

Page 117: ...ommands in configuration mode dot1x IEEE standard for port based access control enable turn on privileged commands erps Ethernet Ring Protection switching exit exit from EXEC mode failsafe configure failsafe relay firmware firmware upgrade or swap help description of the interactive help system ipv4 IPv4 commands ipv6 Ipv6 commands link oamlink OAM configuration logout exit from EXEC mode more dis...

Page 118: ...haracter is shown below Figure 73 Main menu at the SSH interface If necessary Reason Switches have an online help at this interface Thus when typing a command plus it will be displayed all allowed subcommands of a given menu For example if it is necessary to view all IP interfaces configured at the equipment type first show It will be displayed all of the options allowed at the show menu IP menu w...

Page 119: ...n interface can be used through Ethernet electrical or optical connections To use this protocol it is necessary to know the IP of the equipment to be accessed If used this interface requires a computer with Telnet aware software to communicate with Reason Switches Allowed commands at the main menu are clear reset functions configure enter configuration mode copy copy from source to destination del...

Page 120: ...y file no negate a command or set its defaults ping send ICMP echo messages platformplatform configuration ptp misc non persistent 1588 settings reload reload system send send a message to other tty lines show show running system information terminal set terminal line parameters veriphy veriphy keyword Each command has a menu inside with its own subcommands The main menu displayed after typing the...

Page 121: ...w menu IP menu will be there Then type show ip It will be displayed all of the options allowed at the IP menu interface will be there Then type show ip interface It will be displayed all of the options allowed at the interface menu brief will be the only choice Then type show ip interface brief The command above is the full command to view all IP interfaces configured at the equipment After typing...

Page 122: ...isplay the power connectors used for Reason switches Figure 75 T1000 Power Supply Connector Figure 76 S2020 and S2024G Power Supply Connector Reason Switches do not have a power on or power off button After power is connected the switch will power up After powered up the unit LEDs will perform a pattern that indicates switch is being initialized After a few seconds Link RX and TX LEDs will indicat...

Page 123: ...st be used at this interface Figure 77 B type USB connector at Reason Switches When using the USB interface it is necessary to configure the USB port serial communication parameters at the computer used to communicate with the equipment Serial parameter must be as follow Speed 115200 Data bits 8 Stop bits 1 Parity None Flow control None Allowed commands at the main menu are clear reset functions c...

Page 124: ...grade or swap help description of the interactive help system ipv4 IPv4 commands ipv6 Ipv6 commands link oamlink OAM configuration logout exit from EXEC mode more display file no negate a command or set its defaults ping send ICMP echo messages platformplatform configuration ptp misc non persistent 1588 settings reload reload system send send a message to other tty lines show show running system i...

Page 125: ... menu IP menu will be there Then type show ip It will be displayed all of the options allowed at the IP menu interface will be there Then type show ip interface It will be displayed all of the options allowed at the interface menu brief will be the only choice Then type show ip interface brief The command above is the full command to view all IP interfaces configured at the equipment After typing ...

Page 126: ...w Figure 79 Ethernet RJ45 connector at Reason Switches To use HTTP HTTPS SSH or Telnet protocols it is necessary to access the equipment through Ethernet interface electrical or optical USB direct connection communication is performed by a serial link at the USB interface Factory default IP address and netmask are IP Address 192 168 4 88 Netmask 255 255 255 0 For security reasons Reason Switches a...

Page 127: ...figuration via web browser for the first time configure the terminal for any address between 192 168 4 1 and 192 168 4 254 except 192 168 4 88 which is the factory IP Mask is 255 255 255 0 for local connection At Windows OS follow the steps to change the terminal IP address Enter at Control Panel Choose the network connections option At the Local Connection Status choose the Properties option At t...

Page 128: ...en USB connection is used Reason Switches management interface is accessed through an IP address which requires IP address at the same IP network as the computer used to access the equipment To check it do an AND Boolean comparison between IP address and Mask values of both equipment If the result is the same for both then they are at the same IP network ...

Page 129: ... switch is restarted this configuration is discarded and the switch will load after the reboot the Startup Config file Startup Config This file represents the configuration that the switch will run after it is powered up or restarted If a change in the Running Config was performed and it is requested to maintain the Running Config at the Startup Config the user must have to save it at Save Running...

Page 130: ...e for switch This field is by convention the fully qualified domain name FQDN The first character must be an alpha character and space character is not allowed Allowed string length is up to 255 and allowed characters are strings drawn from the alphabet letters numbers and minus signal System Location Identification of where this switch is installed Allowed string length is up to 255 and allowed c...

Page 131: ...d o No DNS server no servers to name resolution are used o Configured IPv4 the server must be explicitly configured with a valid IPv4 address The format of the IP address is dotted decimal notation o From this DHCPv4 interface the server used will be the server configured at a given DHCPv4 interface The field must be configured with the VLAN ID number of the DHCPv4 interface desired Allowed VLAN I...

Page 132: ... be the IP configured at the IPv4 Address field Value 0 disables this field and allowed values are from 0 to 4 294 967 295 seconds o DHCPv4 Current Lease For interfaces with DHCPv4 enabled this field display the IP address obtained by the DHCPv4 server at the VLAN of this interface o IPv4 Address define the static IP address to be used at this interface Values must be inserted in dotted decimal no...

Page 133: ...ne network IP address of destination route IPv4 values must be inserted in dotted decimal notation and IPv6 values must be inserted with hexadecimal values with each field of the address separated with a colon marker o Mask Length define the number of bits to be used as mask to the IP address from the most significant bit to the lowest significant bit o Gateway define the IP address of the gateway...

Page 134: ...ystem NTP Allowed configuration is as shown below Mode This field is used to enable disable the NTP time synchronization function By default it is disabled To enable select Enabled in the Mode list and then configure a valid IP address server Server These fields Server 1 to 5 specify to which NTP servers the switch must send NTP time requests Thus the equipment will receive NTP messages to synchro...

Page 135: ... Daylight Saving Time to be used by Reason Switches internal clock When used the internal clock will consider the time zone plus the offset configured in minutes It is possible to choose if the DST will be used only once or will be recurring at all years By default DST Daylight Saving Time is disabled Possible configurations are as follows Daylight Saving Time enable or disable the DST function If...

Page 136: ... at End Time Settings o Offset set the offset that will be applied at the internal clock at the DST period in minutes This value will be added at the internal clock during the DST After change one of the configurations described before the user may save or discard them o Save save configuration at the Running Config o Reset undo changes made locally at the Running Config 2 5 Log System Log Configu...

Page 137: ...l be used as a filter Reason Switches syslog level is divided in 4 categories error severity 3 warning severity 4 notice severity 5 and informational severity 6 Severity levels are defined in RFC 5424 document When choosing higher severities levels it will be send by the equipment all messages of lower levels plus the severity level selected Thus choosing informational severity level allows the us...

Page 138: ...s field allows configuring the speed at a given port Port speed configuration will depend on the port type electrical or optical and possible options are as follows o Disabled disable the port that is turn communication off at that port o Auto enable electrical port speed auto negotiation allowed only for electrical ports o 10Mbps HDX enable port speed to 10 Mbps in half duplex mode o 10Mbps FDX e...

Page 139: ...tise its partners of all capacity up to 1 Gbps It is possible to configure these fields as follows o Speed 10 checkbox enable advertising link partners at the port that 10 Mbps speed is supported at that port if checked o Speed 100 checkbox enable advertising link partners at the port that 100 Mbps speed is supported at that port if checked o Speed 1000 checkbox enable advertising link partners at...

Page 140: ...ox is disabled or port is in Auto mode Maximum Frame Size This field allows configuring the maximum frame size accepted by the switch including the FCS bits in bytes Frames with sizes higher than specified in this field are discarded Allowed values are from 1518 to 10056 Excessive Collision Mode This field allows configuring switch s behaviour when there are collisions detected at a given port A c...

Page 141: ...Chapter 7 Configuration GE Reason Switches REASON SWITCHES TM EN 3 141 o Refresh refresh the web page Changes made locally which were not saved will be discarded from the Running Config ...

Page 142: ...rs configuration by clicking on it When clicking at the user name the User Settings menu will open Possible configurations are as follows o User Name the user name that will be used by this user Allowed values are letters numbers and underscore Maximum user name size is 31 characters o Password the password that will be used to identify this user Allowed character is any printable character includ...

Page 143: ... level is allowed per user After one of the configurations described before is changed there are buttons that allow the user to save or discard the configurations and to cancel the menu o Save save configuration at the Running Config o Reset undo changes made locally at the Running Config o Cancel cancel the configuration and leave the menu Privilege Levels The Privilege Levels menu allows mapping...

Page 144: ...the Privilege Level selected to have access at the group o Status Statistics Read write select the privilege level number which will be allowed to read and write status and statistics parameters User privilege level should be the same or greater than the Privilege Level selected to have access at the group After one of the configurations described before is changed there are two buttons that allow...

Page 145: ... No authentication is disabled in this client and login is not possible o Command Authorization Method Configuration define how the user will be authenticated when using the CLI Command Line Interface when accessing from console SSH or Telnet Method select the authentication method of this client Allowed methods are Tacacs authentication of this client will be done remotely through a TACACS server...

Page 146: ...the web page o Save save configuration at the Running Config o Reset undo changes made locally at the Running Config SSH The SSH menu allows enabling the SSH protocol The selection is made at the list at the Mode row Possible configurations are as follows o Enabled enable the SSH protocol usage as access and configuration interface o Disabled disable the SSH protocol usage as access and configurat...

Page 147: ...e Maintain select which mode should be used to maintain HTTPS certification Only allowed when Mode is disabled None no action to maintain certification will be done Delete delete certification Upload upload the certification If allowed the PassPhrase Certificate Upload and File Upload fields will appear Possible values are as follows o PassPhrase type the pattern that will be used for encrypting t...

Page 148: ...ored in HTTPS database o Switch secure HTTP certificate is generating switch is generating a certification to be stored in HTTPS database After one of the configurations described before is changed there are two buttons that allow the user to save or discard the configurations and to refresh the web page o Save save configuration at the Running Config o Reset undo changes made locally at the Runni...

Page 149: ... in dotted decimal notation o HTTP HTTPS enables if checked the host to access the switch through HTTP and HTTPS protocol at the configured VLAN and the specified range of IP addresses o SNMP enables if checked the host to access the switch through SNMP protocol at the configured VLAN and the specified range of IP addresses o Telnet SSH enables if checked the host to access the switch through Teln...

Page 150: ...sion community information is get at the communities table Allowed string length is up to 255 and allowed characters are the ASCII characters from 32 to 126 basically letters numbers and other characters such as or _ o Engine ID indicates SNMPv3 engine ID Used only on SNMPv3 version Trap Trap menu allows configuring trap sending messages throughout SNMP protocol While SNMP general messages should ...

Page 151: ... or Disabled o Trap Inform Timeout seconds indicates Trap Inform operation timeout By default this value is 3 seconds Allowed values are from 0 to 2 147 seconds o Trap Inform Retry Times indicates how many times a Trap Inform operation will retry sending an inform message By default this value is 5 times Allowed values are from 0 to 255 times o Trap Probe Security Engine ID enable using engine ID ...

Page 152: ...o Delete click at the button to delete the filter at the row o Community indicates community name to permit access of a SNMPv3 agent Maximum community name length is 32 and allowed characters are the ASCII characters from 33 to 126 basically letters numbers and other characters such as or _ For SNMPv1 and SNMPv2c community name will be treated as security name o Source IP indicates SNMP access sou...

Page 153: ... create a flag to indicate this protocol usage o Authentication Password the password that will be used to identify this user Password length for MD5 protocol should be from 8 to 32 characters and for SHA protocol should be from 8 to 40 characters Allowed characters are the ASCII characters from 33 to 126 basically letters numbers and other characters such as or _ o Privacy Protocol select the pri...

Page 154: ...ngth is 32 and allowed characters are the ASCII characters from 33 to 126 basically letters numbers and other characters such as or _ o Views Views menu allows configuring SNMPv3 views table to select what should appear or not at the OID SNMP tree By default default_view is created To add new view click at the Add New Entry button and the following field will appear o Delete click at the button to...

Page 155: ...ct the security model to be used for the selected group Possible values are NoAuth NoPriv Auth NoPriv and Auth Priv No at the beginning means no use of authorization or privacy Thus it is possible to choose from no authentication and no privacy authentication and no privacy and finally authentication and privacy security levels o Read View Name select the name which will be shown of this MIB when ...

Page 156: ...GE Reason Switches Chapter 7 Configuration 156 REASON SWITCHES TM EN 3 o Reset undo changes made locally at the Running Config ...

Page 157: ...rnet frame will be used to define on which port of aggregation group traffic will be redirected o IP Address traffic balancing will use IP address traffic as filter IP addresses at the Ethernet frame will be used to define on which port of aggregation group traffic will be redirected o TCP UDP Port Number traffic balancing will use TCP or UDP port numbers as filter TCP UDP port number field at the...

Page 158: ...ows configuring dynamic port aggregation on the switch Link Aggregation Control Protocol will aggregate ports automatically when two Aggregation nodes are connected and ports connected allow being used in aggregation mode Aggregation LACP menu is located at Settings Aggregation LACP LACP Port Configuration All allowed configurations are displayed by default The first column displays port number th...

Page 159: ...nk o Timeout indicates LACP timeout between transmissions of LACP packets Fast will allow transmitting LACP messages each second and Slow will allow transmitting LACP messages each 30 seconds o Prio indicates port priority to be used by LACP protocol If LACP partner try to form a larger group than supported by the device this value will be used to define which ports will be used Lower priority num...

Page 160: ... o Shutdown Time indicates the period in seconds that the port will be disabled when a loop is detected and port is configured to shut down when this occurs Allowed values are from 1 to 604 800 seconds and default value is 180 seconds Port Configuration This menu contains the settings allowed to perform when a loop is detected The first column displays port number that is being configured in a giv...

Page 161: ...age to the log server configured at System Log menu when a loop is detected on the port o Tx Mode indicates if ports are sending loop protection messages or just listening for looped PDU messages at the network If Enabled is selected port will effectively send messages and if Disabled port will only wait for looped PDU loop protection messages After one of the configurations described before is ch...

Page 162: ...g basic topics of the STP usage It is divided in Basic and Advanced Settings tables Possible configurations are as follows o Basic Settings Protocol Version select the Spanning Tree protocol to be used Possible values are STP RSTP and MSTP protocols Protocol set in this field will be the protocol used in this switch to solve loops in a given LAN If lower protocol is the only available at the netwo...

Page 163: ...dvanced Settings Edge Port BPDU Filtering indicates if Edge ports explicitly configured as Edge ports in the CIST Ports menu will transmit and receive BPDU packets Checkbox selected means that Edge ports will not receive nor transmit BPDU data and checkbox empty means that Edge Ports could receive and transmit BPDU information Edge Port BPDU Guard indicates if Edge ports explicitly configured as E...

Page 164: ...that identifies the MSTI region All Bridges at the same region should have the same Configuration Name By default configuration name at a given switch is the MAC address of the switch Maximum configuration name is 32 characters o Configuration Revision indicates the revision of the Configuration Name that identifies the MSTI region All Bridges at the same region should have the same Configuration ...

Page 165: ...MSTI priority field is the value used by the bridges that supports MSTP protocol to elect the root bridge in a given region If one configuration is desired to be applied at all instances then the row should be used that is configuration done in the row will be replied to all instances Possible configurations are as follows o MSTI shows MSTI instance identifier given row of the table The first row ...

Page 166: ... chosen to forward traffic at the expenses of higher path costs Allowed values are Auto and Specific If Auto is selected path costs will be calculated based on port speed capabilities as recommended at the 802 1D standard If Specific is selected path cost used will be the path cost defined by user at the field allowed in the Path Cost column Allowed path costs values are integer values from 1 to 2...

Page 167: ...hese messages BPDU Guard enable the port to operate in BPDU Guard mode This function causes the port to disable itself if a BPDU message is received in that port as could happen if a non STP bridge is looped in the Spanning Tree network Ports operating as Edge ports are not affected by this setting Checkbox selected means that the port will disable itself if a BPDU packet is received and checkbox ...

Page 168: ...tialized with value equal 0 and Edge means that Edge operation flag will be initialized with value equal 1 Auto Edge enable Auto Edge port detection at the port This checkbox allow the switch to detect if a port is an Edge or Trunk spanning tree port automatically Checkbox selected means Auto edge detection enabled and checkbox empty means disabled Restricted enables Root guard functions If it is ...

Page 169: ...e of the configurations described before is changed there are buttons that allows the user to save or discard the configurations o Save save configuration at the Running Config o Reset undo changes made locally at the Running Config MSTI Ports MSTI Ports Settings menu allows configuring CIST parameters to each MSTI instance A given port can operate as a CIST port for many MSTI instances if this po...

Page 170: ...on Port shows the aggregated ports to be configured at this row Path Cost indicates the path cost value that will be announced by the port to other bridges in the same MSTI instance Lower path costs mean higher port speed and they are chosen to forward traffic at the expenses of higher path costs Allowed values are Auto and Specific If Auto is selected path costs will be calculated based on port s...

Page 171: ... executed and disabled means no filtering profile will be done o IPMC Profile Table Setting Indicates which profiles are created By default no profile is configured at the switch If a new profile is required click at the Add New IPMC Profile button When clicked it will appear the following fields to be configured Delete click at the button to delete the profile at the row Profile Name indicates th...

Page 172: ...Address Entry menu and allow creating names and IP Multicast address ranges to be used at profile rules If no entry is selected the character means no entry selected o Action indicates group learning action allowed to be executed by this rule After receiving join or report messages from a given group switch will compare if IP address range is compatible with the allowed range of this rule If IP mu...

Page 173: ...ser to save or discard the configurations o Commit save configuration at the Running Config o Reset undo changes made locally at the Running Config Address Entry Profile Table menu allows the user to create entries to be used at the profiles created in the Profile Table menu These entries are used in the profiles used at IGMP and MLD protocols to define which group to enjoy at the multicast group ...

Page 174: ...ing is related to IPv4 environments and MLD Snooping is related to IPv6 IPMC menu are located at Settings IPMC IGMP Snooping IGMP Snooping menu configurations menu contains basic configuration of the IPMC function IGMP snooping will be the mechanism to allow multicast communication in an IPv4 environment o Basic Configuration IGMP Snooping Configuration indicates basic IGMP snooping configuration ...

Page 175: ...nd leave messages to the router side port In this mode switch will operate to the router side as a host exchanging host leave and join messages Checkbox selected means function enabled and checkbox empty means disabled Port Related Configuration indicates basic port IGMP snooping configuration Possible configuration is as follows Port shows the ports to be configured at this row Router Port enable...

Page 176: ...red click at the Add New IGMP VLAN button When clicked it will appear the following fields to be configured Delete click at the button to delete the VLAN entry at the row VLAN ID specify the VLAN that is expected for receiving in multicast frames from the address at this entry Allowed values are the VLAN allowed values from 1 to 4 095 Snooping Enabled enable IPMC Snooping function for this entry C...

Page 177: ...number increased RV value must not be equal to 0 or 1 By default its value is set to 2 Allowed values are integer numbers from 2 to 255 QI sec indicates the Query Interval to be used between general queries of this entry These general queries messages are exchanged between IGMP interfaces to all of them have knowledge about the multicast group Allowed values are integer numbers from 1 to 31 744 se...

Page 178: ...e being applied to this port After one of the configurations described before is changed there are buttons that allow the user to save or discard the configurations Save save configuration at the Running Config Reset undo changes made locally at the Running Config MLD Snooping MLD Snooping menu contains basic configuration of the IPMC function MLD will be the mechanism to allow multicast communica...

Page 179: ...o avoid forwarding unnecessary join and leave messages to the router side port In this mode switch will operate to the router side as a host exchanging host leave and join messages Checkbox selected means function enabled and checkbox empty means disabled Port Related Configuration indicates basic port MLD snooping configuration Possible configuration is as follows Port shows the ports to be confi...

Page 180: ...ific MLD entry is required click at the Add New MLD VLAN button When clicked it will appear the following fields to be configured Delete click at the button to delete the VLAN entry at the row LAN ID specify the VLAN that is expected for receiving in multicast frames from the address at this entry Allowed values are the VLAN allowed values from 1 to 4 095 Snooping Enabled enable MLD Snooping funct...

Page 181: ...hich is the maximum time that clients can take to answer to a general query message Allowed values are numbers from 1 to 31 744 tenth of seconds By default query interval is set to 100 which means 10 seconds LLQI 0 1 sec indicates the Last Listener Query Interval of this entry LLQI timer indicates the maximum time allowable by a client to answer to the querier When this timer is expired querier an...

Page 182: ...the profile names configured at the Profile Table at the IPMC Profile menu The field means no filtering profile being applied to this port After one of the configurations described before is changed there are buttons that allow the user to save or discard the configurations Save save configuration at the Running Config Reset undo changes made locally at the Running Config ...

Page 183: ...onfiguring switch s behaviour at the MAC learning process that is if switch will use filters configured to limit access to the LAN or not Each port can have its MAC learning function selected separately Possible configurations are as follows o Auto select to allow the learning process to start as soon as frame is received If MAC address is not known port will learn MAC address source or destinatio...

Page 184: ... MAC address Allowed values are the VLAN allowed values from 1 to 4 095 o MAC Address specify the MAC address number of the entry allowed Values must be inserted in hexadecimal format and each octet must be separated by the signal o Port Members specify which ports allow ingression of frames from this MAC address Checkbox selected means port allowed to receive frames from this MAC address and chec...

Page 185: ...values from 1 to 4 095 It is possible to insert specific VLAN identifiers separated by comma for instance 1 2 10 40 a range of VLAN identifiers using the character for instance 10 40 and a meshed specific and range VLAN identifiers for instance 1 2 10 40 o Ethertype for Custom S ports indicates Ethertype allowed in addition to 802 1Q defined 0x8100 Ethertype to ingress if port is configured as S C...

Page 186: ...iple VLAN at the same port For instance Merging Unit sending Sampled Values and GOOSE messages throughout the same Ethernet interface should be connected to a Trunk port as it will receive both VLAN messages Main characteristics of these ports are VLAN Identifier Ingress process untagged frames are forwarded to the Port VLAN identifier VLAN and tagged frames are forwarded to the VLAN that is embed...

Page 187: ...agging field configuration A Hybrid port can be set to Untag only frames with Port VLAN identifier that is untagged frames leave the switch untagged and tagged frames leave the switch tagged or to Tag all frames Egress Tagging filtering does not affect Ingress Acceptance filter VLAN Identifier Ingress process untagged frames are forwarded to the Port VLAN identifier VLAN and tagged frames are forw...

Page 188: ...configured at the Ethertype for Custom S ports will be forwarded to the VLAN embedded at the frame At the egress process S Ports forward tagged frames if configured to with S tag VLAN identifier o Ingress Filtering enable frames ingress filtering function If enabled frames classified to a VLAN that port is not member is discarded Thus only Allowed VLANs identifiers and identifiers that do not belo...

Page 189: ...ecifies all VLAN that these port modes can be member of Allowed values are the VLAN range values from 1 to 4 095 It is possible to insert specific VLAN identifiers separated by comma for instance 1 2 10 40 a range of VLAN identifiers using the character for instance 10 40 and a meshed specific and range VLAN identifiers for instance 1 2 10 40 By default Trunk and Hybrid ports are members of all VL...

Page 190: ...tions are shown in the Port Policing and WRED menus QoS menu is located at Settings QoS 11 1 Port Classification Port Classification menu allows configuring basic QoS ingress classification at a given port If one configuration is desired to be applied at all ports then the row should be used that is configuration done in the row will be replied to all ports Possible configurations are as follows o...

Page 191: ...configure a PCP to QoS queue at each port independently This configuration is only applied in tagged or priority tagged frames that is frames with PCP information Possible values are Disabled and Enabled Disabled means that PCP used in tagged and priority tagged frames will be the value embedded at the frame and enabled means that QoS queue selected by each PCP value will be as configured in that ...

Page 192: ...rations are as follows o Port shows the ports to be configured at this row o Enabled enable Port Policing function at the port Checkbox selected means function enabled and checkbox empty means disabled o Rate indicates the maximum allowed traffic on that port Traffic rates at the port higher than this field are not allowed if function is enabled then traffic close to the limit will start packet lo...

Page 193: ...queue Possible configuration is as follows Rate indicates the maximum allowed traffic on that port Traffic rates at the port higher than this field are not allowed if function is enabled then traffic close to the limit will start packet losing based on the QoS configured Allowed values are integer values and limits depend on the Unit used Range of 100 to 1 000 000 is allowed when kbps or fps units...

Page 194: ...ight configuration Queue Shaper indicates queue rate to be used by shaping function Each queue has its own shaper configuration If congestion happens at a given queue at the port queue shapers will perform switching functions to guarantee that average traffic at that queue does not excess Queue Shaper Rate configured Possible configuration are as follows Enable enable Queue Shaper function at the ...

Page 195: ...configuration are as follows Enable enable Port Shaper function at the port Checkbox selected means function enabled to that queue and checkbox empty means disabled Rate indicates maximum average traffic allowed in the port Sporadic peak traffic will be stored at internal buffer to be forwarded when peak traffic is lower than Port Shaper Rate value Allowed values are integer values and limits depe...

Page 196: ...sible configurations are as follows o Port indicate the ports to be configured at this row Port field is a hyperlink that allows accessing QoS Egress Port Scheduler and Shapers settings Port scheduler menu allows configuring port to operate in Strict Priority scheduler mode or 6 Queues Weighted mode Possible configuration after clicking Port number hyperlink are as follows Scheduler Mode indicates...

Page 197: ...indicates the weight that queue will have in the shaping process This number will be used by internal algorithm to define how much average bandwidth that queue can use Percent shows the percentage value that the queue will fill in allowed bandwidth to the queues in weighted mode Port Shaper indicates port rate to be used by shaping function Each port has its own shaper configuration and each queue...

Page 198: ...allows configuring egress behaviour of frames Thus this menu allows remapping all frames that have priority information at the ingress process Ports can be set to not change PCP value at egress of the frame use only one defined PCP to all frames or map each QoS queue to a specific PCP value Possible configurations are as follows o Port indicate the ports to be configured at this row Port field is ...

Page 199: ...s to be used in all forwarded frames per queue Possible configurations are as follows QoS class shows the QoS queue to be configured at this row DP level shows the DP level to be configured at this row PCP indicates which PCP value must be attached to frames with QoS class PCP bits and DP level shown in the QoS class and DP level columns That is a given PCP frame with a given DP level should be re...

Page 200: ...sification Possible configuration is as follows Disable indicates that no ingress DSCP is used This means that DSCP analysis for QoS function is disabled at the port DSCP 0 indicates that only frames with DSCP bits equal 0 should be classified DSCP to QoS Class classification will be as configured at the DSCP Classification Selected indicates that only frames with DSCP bits marked should be classi...

Page 201: ... queue and DPL levels Possible configurations are as follows o DSCP shows the DSCP level to be configured at this row o Trust indicates if DSCP value is trusted and thus can be remapped to the QoS Class and DPL configured Only trusted DSCP levels are remapped as configured to the QoS Class and DPL columns Untrusted DSCP frames are treated as non IP frame by the switch Checkbox selected means DSCP ...

Page 202: ... the DSCP level chosen at the Translate field Allowed values are the DSCP values range from 0 to 63 o Classify indicates if selected ingress translation should be used by this port This checkbox will enable the Selected option at Classify at the Port DSCP menu Thus if a port is set to Selected this field will specify which DSCP levels will be classified at the port Checkbox selected means that DSC...

Page 203: ...nged there are buttons that allow the user to save or discard the configurations and to cancel the menu o Save save configuration at the Running Config o Reset undo changes made locally at the Running Config 11 11 QoS Control List QoS Control List menu allows configuring QCL function QCL is a way to define quality of service for a given traffic based on many settings such as destination or source ...

Page 204: ... VLAN identifier numbers Specific and Range If specific is selected the Value field must be filled with VID number desired and allowed values are the VLAN range values from 1 to 4 095 If range is selected the From and To fields must be filled with VID range numbers desired and allowed values are the VLAN range values from 1 to 4 095 PCP indicates PCP values to be applied as filter at the key param...

Page 205: ...ured will be used at this QCE that is this entry will map frames based in many parameters including its DSAP value Values must be inserted in hexadecimal format o SSAP Address indicates which filter should be applied based on the Source Service Access Point SSAP field at the frame Possible configuration is as follows Any indicates that all incoming frames will be used at this QCE Specific only SSA...

Page 206: ...ng its PID value Values must be inserted in hexadecimal format IPv4 indicates which IPv4 values will be allowed in this QCE When selected the IPv4 Parameters will be displayed Possible configuration is as follows Protocol indicates which filter should be applied based on the IPv4 protocol number field at the frame Possible configuration is as follows o Any indicates that all incoming frames will b...

Page 207: ... decimal format Range indicates that only a range of specified UDP ports will be used at this QCE Values must be inserted in decimal format o TCP indicates that only TCP will be used at this QCE that is this entry will map frames based in many parameters including if it is a TCP protocol When selected the TCP Parameters will be displayed Possible configuration is as follows Sport indicates which s...

Page 208: ...parameters including if it is specified IP protocol Values must be inserted in decimal format SIP indicates which filter should be applied based on the IPv4 source address at the frame Possible configuration is as follows Any indicates that all source IP address frames will be used at this QCE Specific indicates that only specified IP address will be used at this QCE Values of the IP address and m...

Page 209: ...ld be redirected to Allowed values are the DSCP range values from 0 to 63 After one of the configurations described before is changed there are buttons that allow the user to save or discard the configurations o Save save configuration at the Running Config o Reset undo changes made locally at the Running Config 11 12 Storm Policing Storm Policing menu allows configuring storm prevention function ...

Page 210: ...o be applied when frames are from and to unknown hosts that is flooded frames throughout the network Possible configuration is as follows Enabled enable Unknown Frames policing function at the port Checkbox selected means function enabled and checkbox empty means disabled Rate indicates rate to be applied on the storm policing function at that port Traffic rates at the port higher than this field ...

Page 211: ...m 0 to 100 0 means no traffic and 100 means all capacity traffic at a given port o Max DP1 indicates drop probability of DPL 1 frames when traffic at the queue is 100 This field allows setting a probability for loosing packets marked with Drop Precedence Level DPL 1 Values are in percentage and allowed values are from 0 to 100 0 means no traffic and 100 means all capacity traffic at a given queue ...

Page 212: ...N 3 Figure 81 DPL level usage After one of the configurations described before is changed there are buttons that allow the user to save or discard the configurations o Save save configuration at the Running Config o Reset undo changes made locally at the Running Config ...

Page 213: ... UTP cables and RJ45 connectors Ports in mirroring function can be set as Source ports Intermediate ports and Destination port A source port is the port that traffic should be mirrored data source Destination port is the port that will show mirror traffic from the source port Finally Intermediate port is a port that is located in a switch which does not have source ports that is mirroring is done ...

Page 214: ...traffic to a specific VLAN Allowed values are the VLAN range values from 1 to 4 095 o Reflector Port indicates the main Source port of a remote mirroring function Reflector port is the port at the Source RMirror switch that will receive traffic from all ports mirrored and forward it to Intermediate RMirror or Destination RMirror remote mirroring switch Only Electrical ports RJ45 and UTP cable conn...

Page 215: ...traffic transmitted frames are being mirrored o Intermediate enable the port to operate as Intermediate port Intermediate ports are ports that connect switches performing remote mirroring Checkbox selected means that port will operate as intermediate port that is source traffic of this port will be a Reflector port or another Intermediate port Checkbox empty means port will not operate as intermed...

Page 216: ...ES TM EN 3 After one of the configurations described before is changed there are buttons that allow the user to save or discard the configurations o Apply apply and save configuration at the Running Config o Reset undo changes made locally at the Running Config ...

Page 217: ...be operating and Disable will disable the pulse per second output function o External Enable enable external clock output Enable will allow the function to be operating and Disable will disable the external output function o Adjust Method indicates external clock adjustment method to be applied Possible values are as follows LTC Frequency enable external clock adjustment to be done by Local Timer ...

Page 218: ... at the message and will forward PTP messages on ports configured to be a part of this instance e2e Transp clock configured at this instance will be a Transparent clock with delay mechanism defined as end to end That is this instance will forward the message on ports configured to be a part of this instance and network delay will be calculated from all network way like NTP protocol in layer 3 appl...

Page 219: ...y PTP messages is Multicast This is the protocol recommended to be used in power system installations EthernetMixed PTP messages at this instance are mapped directly at the Ethernet frame that is synchronization is done in layer 2 communication environments PTP messages in the network are received as unicast and multicast messages IPv4Multi PTP messages at this instance are mapped at the IP frame ...

Page 220: ... selected means instance should be deleted after Save button is pressed and checkbox empty means that instance should be maintained at the Running Config after the Save button is pressed o Clock Instance shows clock instance defined previously at the Clock Instance field This number is a hyperlink that can be used to configure the instance if required Default instance configuration should be enoug...

Page 221: ...TP packets 3 IED receiving GOOSE and Sampled Values can receive both messages with VLAN tag 4 IED receiving only GOOSE messages is VLAN unaware so GOOSE messages should be delivered to this equipment without VLAN information 5 All equipment management interfaces used is at the same port used for other messages and management communication TCP IP is performed with untagged frames 6 IED Receiving on...

Page 222: ...l communicate with the equipment in that port Thus Merging Unit configuration ports should have the following characteristics VLAN Identifier Ingress process untagged frames would be forwarded to the Port VID VLAN and tagged frames are forwarded to the VLAN that is embedded at the frame Filtering ingress process this port should accept both untagged and tagged frames Egress process egress process ...

Page 223: ...ing ingress process this port should accept both untagged and tagged frames Egress process egress process should be set to Untag only frames with Port VLAN identifier Thus configuration of the port where the switches are connected should be as follows o Port mode should be chosen as Trunk port o Port VLAN should be 1 o For trunk ports Port Type is not allowed to be changed from C Port o For trunk ...

Page 224: ... should be as follows o Port mode should be chosen as Trunk port o Port VLAN should be 1 o For trunk ports Port Type is not allowed to be changed from C Port o For trunk ports Ingress Filtering is not allowed to be changed from enabled o For trunk ports Ingress Acceptance is not allowed to be changed from Tagged and Untagged o Egress tagging should be chosen as Untag Port VLAN o Allowed VLANs shou...

Page 225: ...Ns should be 1 10 20 30 o No forbidden VLANs should be configured Switch configuration where IED Receiving GOOSE and Sampled Values is connected o Port where IED Receiving GOOSE and Sampled Values is connected This port will receive untagged and tagged frames and send untagged frames only used by management software communication Thus IED Receiving GOOSE and Sampled Values configuration ports shou...

Page 226: ...where other switches are connected This port will receive untagged and tagged frames and send tagged and untagged frames from many VID as all traffic from switches should traffic at these ports Thus configuration of these ports should have the following characteristics VLAN Identifier Ingress process untagged frames would be forwarded to the Port VID VLAN and tagged frames are forwarded to the VLA...

Page 227: ...ocess untagged frames would be forwarded to the Port VID VLAN and tagged frames are not expected Thus tagged frames can be if to be forwarded to the VLAN that is embedded at the frame Filtering ingress process this port should accept both untagged and tagged frames but there is a critical point on Sampled Values messages on that port Thus it is desirable to set Sampled Values VLAN as forbidden Egr...

Page 228: ...he switches are connected should be as follows o Port mode should be chosen as Trunk port o Port VLAN should be 1 o For trunk ports Port Type is not allowed to be changed from C Port o For trunk ports Ingress Filtering is not allowed to be changed from enabled o For trunk ports Ingress Acceptance is not allowed to be changed from Tagged and Untagged o Egress tagging should be chosen as Untag Port ...

Page 229: ... Port For trunk ports Ingress Filtering is not allowed to be changed from enabled For trunk ports Ingress Acceptance is not allowed to be changed from Tagged and Untagged Egress tagging should be chosen as Untag Port VLAN Allowed VLANs should be 1 10 20 30 No forbidden VLANs should be configured These VLAN configuration settings should be enough to guarantee that only equipment expecting to receiv...

Page 230: ... MSTP protocol is set as the protocol to solve loops at the network For these applications there is no major configuration that is necessary to be performed except to change protocol version to RSTP as default configuration is ready to send and receive BPDU packets and then use it to solve loops in the network Default settings of Reason Switches are as follows Bridge Settings o Protocol used is MS...

Page 231: ...as follows At this situation the only configuration needed to be done is changing Protocol Version to RSTP Protocol itself will choose root bridge designated root alternate and backup ports and could deal with the loops at the network in a RSTP environment If there is one specific bridge that is desired to be the root choose the lowest Bridge Priority to that bridge and then configuration is done ...

Page 232: ... If necessary the first example of this chapter can guide on how to configure a VLAN in Reason Switches With information given above it is possible to go to the Settings PTP menu to start configuration process The configuration of the PTP should be as follows By default no PTP clock instances are available Thus it is necessary to create an instance to be used as P2P transparent clock Click at the ...

Page 233: ...ecting switch to switch and PTP clocks should be members of the instance PTP usage without VLANs Consider the assumptions below 1 PTP information given by PTP Grandmaster Clock as o Domain 0 o Transmitted over Ethernet without VLAN information and PCP is 0 o Operation mode is two step o Delay mechanism is peer to peer 2 There is no VLAN being used by switches that is GOOSE Sampled Values PTP and o...

Page 234: ...ance based on the previous configurations will be created At the instance created select at the checkboxes which ports will be members of the instance In the example given ports that must be in the same parameters instance are o Port where PTP Grandmaster Clock is connected o Port where there are switch to switch connections o Port where PTP slave clocks are connected In this example port where Me...

Page 235: ...y check the Auto Refresh checkbox on top to perform it If selected monitoring web page will be updated after 3 seconds of the last update automatically Information System information presents basic information about the switch o System System s contact System s contact name System s location o Key Key number which means key activation number PTP allowed If 1 PTP function is enabled and if 0 PTP fu...

Page 236: ...00 ms average CPU load blue line refers to a 1 second average CPU load and magenta line refers to a 10 seconds average CPU load IP Status IP Status option allows user to view IP interfaces for switch management interfaces IP routes configured and the neighbour cache ARP cache o IP Interfaces shows IP addresses of the management interfaces of the switch Interface VLAN If internal interface the OS I...

Page 237: ...g messages from the memory the Clear button allows the user to delete log messages stored The left and right buttons switch the displayed pages By default 20 log messages are displayed per page The information present are o ID of the log message o Level of the log message according to its information o Timestamp of the log message based on switch s internal clock o Description of the message Detai...

Page 238: ...Each port type possible is represented in a picture that is the pictures show if port type is ST connector LC connector or RJ45 connector as follows o RJ45 connector representation at the web interface o SFP connector representation at the web interface o ST connector representation at the web interface The ST connector port is only allowed in T1000 Switches The S2020 and S2024G switches use only ...

Page 239: ...ion about QoS being executed in each port as described below o Port identifier o Queues Q0 to Q7 queues Received RX and transmitted TX frames at the queue QCL Status QCL Status option allows user to view information about the QoS Control List QCL configured in the switch A table containing the following information is shown o User o QCE identifier o Ports member of the QCL o Frame type configured ...

Page 240: ...cast all broadcast and all Pause frames transmitted o Total received frame size counter which represents all frames divided by its size Shown values are 64 bytes frames to 1527 and above frames o Total transmitted frame size counter which represents all frames divided by its size Shown values are 64 bytes frames to 1527 and above frames o Total Received Queue counters in packets o Total Transmitte...

Page 241: ...es information about the port security status Port security is a module that does not have a specific direct configuration as it is a set of configuration done at the switch Information shown in this menu includes port status users state and MAC addresses and detailed port information MAC address at a given port VLAN ID time since a given MAC entered in the MAC table and so on o NAS if NAS server ...

Page 242: ...ored drop packets total data in octets total data in packets broadcast address data multicast address data CRC error packets undersize detected packets oversize detected packets fragmented detected packets frames with size larger than 64 bytes received with invalid CRC best estimate number of collisions detected total 64 bytes length packets received total frames received with size between 65 and ...

Page 243: ...oring GE Reason Switches REASON SWITCHES TM EN 3 243 o Event shows an overview of the RMON events table such as event index number index of the log entry timestamp of a given log event and description of the log event ...

Page 244: ...e aggregation partner o Partner key which is the key used in that aggregation instance o Partner priority o Last changed that last time since each instance has changed o Local ports presents switch ID plus port number separated each other by the character Ports Status LACP Status option allows user to view information about LACP current usage per port While the System Status provides information o...

Page 245: ...rs This menu allows verifying if there are LACP messages received transmitted and discarded by the equipment Information presented is as follows o Port number o Total received LACP messages per port given in frames o Total transmitted LACP messages per port given in frames o Total discarded LACP messages per port given in frames Discarded frames are shown divided into unknown and illegal discarded...

Page 246: ...ation allowed is as follows o Port number o Action configured to be executed in the interface if a loop is detected which can be Shutdown Log and Shutdown Log o Transmit which represents if the messages sending throughout the network is enabled or not o Loops which represents total loops detected at the port since function was enabled o Status which represents loop detection status at a given port...

Page 247: ...tus menu If MSTI link is accessed allowed information is as follows STP Bridge Status this table contains detailed information about STP current status at the bridge Allowed information at the table is as follows Bridge instance Bridge ID that is the bridge identifier number in the format Priority Bridge MAC Address Root ID that is the root bridge identifier number in the format Priority Bridge MA...

Page 248: ...dium Uptime which represents time since port is up o Bridge ID that is the bridge identifier number in the format Priority Bridge MAC Address o Root ID that is the root bridge identifier number in the format Priority Bridge MAC Address o Root port that is the port at the bridge operating as Root Port o Root path cost o Topology Flag that is current value of the change flag at this instance o Topol...

Page 249: ...ckets are shown o Transmitted BPDU packets in number of BPDU messages There are four columns where BPDU packet exchanging is divided in MSTP RSTP STP and total TCN Topology Change Notification messages transmitted on a given port o Received BPDU packets in number of BPDU messages There are four columns where BPDU packet exchanging is divided in MSTP RSTP STP and total TCN Topology Change Notificat...

Page 250: ...llows o Status shows IGMP table status information VLAN ID VID number of the entry Querier version IGMPv1 IGMPv2 or IGMPv3 Host version IGMPv1 IGMPv2 or IGMPv3 Querier status Allowed values are Active and Idle querier status Queries transmitted in number of queries Queries received in number of queries IGMPv1 reports received in number of reports IGMPv2 reports received in number of reports IGMPv2...

Page 251: ...e Type of the filtering of SSM source specific mode Hardware Filter Switch which indicates if data plane sent by source of the group can be treated by chip or not MLD Snooping provides information about the MLD IPv6 multicast environment current information o Status shows MLD table status information Allowed information is as follows VLAN ID VID number of the entry Querier version MLDv1 or MLDv2 H...

Page 252: ...rce Filtered Multicast information This information is related only to IGMPv3 and MLDv2 protocols which has support to channel subscription VLAN ID VID number of the group Group address range of the group Port members where is displayed which ports are members of the group Mode of SSM filtering which indicates filtering mode VID number port number address range of the group Source address that is ...

Page 253: ...ddress table being used by the switch Rows at the table indicate entries of the MAC table and columns organize information displayed This table is used for forwarding decision by a bridge o Type which indicates type of the learning process Ports configured as Auto will be displayed as Dynamic learning type and Ports configured as Secure will be displayed as Static learning type port o VLAN identif...

Page 254: ...t column means that the port is not a member of VLAN ID related to the row VLAN Ports VLAN Ports Status for Combined users table allows monitoring current port VLAN information configured and running at the switch o Port number o Port type that is if port is Unaware C Port S Port S Custom Port o Ingress filtering at the port Checkbox enabled means port is performing port filtering and checkbox dis...

Page 255: ...k output Thus this information should not be referred PTP Clock Configuration PTP Clock Configuration demonstrates the PTP clock instances configured at the switch o Clock instance number This number is a link which redirects to the PTP Clock s Configuration menu o Device Type configured for instance Allowed values displayed are P2pTransp E2eTransp Ord Bound Master Only and Slave only o Port List ...

Page 256: ......

Page 257: ... the list below T1000 Switch o Up to 6 modules of 2 interfaces each o Copper interface modules with RJ45 Cat5e connectors for 10 100 1000BASE TX with auto negotiation and automatic treatment of polarity inversion HP Auto MDIX o Optic interface modules with ST connectors 100BASE FX multimode fibre or LC 100 1000BASE FX single mode fibre o Special optic interface module to form connection of 2 5 Gbp...

Page 258: ...Cat5e connectors for 10 100 1000BaseTX with auto negotiation and automatic treatment of polarity inversion HP Auto MDIX o Optic interface modules with LC 100 1000BaseFX single mode fibre Time Synchronization o T1000 and S2024G switches are adequate to IEEE 1588 v2 standard and containing a time display by software two step mode in all ports o Operates in transparent TC or boundary BC mode o T1000 ...

Page 259: ...v6 in broadcast multicast and unicast o Supports IGMP v2 v3 and MLD v1 v2 o Detection and avalanche control in broadcast multicast and unicast Management o Configuration in text mode on a safe connection SSH o Configuration in graphic mode on a safe connection SSL o Authentication and native or remote authorization RADIUS and TACACS o Remote monitoring via RMON o Dedicated configuration settings p...

Page 260: ...40 C to 55 C by natural convection fanless Dimensions and Weight o Physical dimensions T1000 4 3 cm Height x 43 6 cm Width x 28 6 cm Depth o Physical dimensions S2020 and S2024G 4 3 cm Height x 43 6 cm Width x 31 cm Depth o Weight approximately 5 kg Port types supported o Copper Ethernet 10 100 1000baseTX with RJ45 connector o Single mode optic fibre 1000baseFX with LC connector SFP o Multi mode o...

Page 261: ...nterface module of 2 5 Gbps for ring formation LC connector pair of single mode fibres 1 2 Human Machine Interface Descriptions Reason Switches are equipped with LEDs which demonstrate in real time the status of each connected port T1000 HMI has three LEDs per port indicating information as follows Information Colour Description Link Off No connection Orange 10 100 Mbps connection Green 1000 Mbps ...

Page 262: ...ating information as follows Information Colour Description Link Off No connection Orange 10 100 Mbps connection Green 1000 Mbps connection Sync Off PTP clock unsynchronized Green PTP clock synchronized Power 1 and 2 Off Power Supply off Green Power Supply operating Failsafe Off Failsafe relay non operating Green Failsafe relay operation ...

Page 263: ...t impact and water meanwhile maintaining adequate temperature and humidity condition for the devices Reason Switches are designed for maximum mounting and display flexibility Switches can be mounted in a standard 19 rack 1 DIN rail only T1000 or directly onto a panel 2 1 Rack Mounting For rack mount installations the T1000 can be ordered with connectors on the front panel or on the rear of the cha...

Page 264: ...adapters As heat within the Reason Switches is channelled to the enclosure it is recommended that 1 rack unit of space be kept unpopulated and free of equipment above each Reason Switches to allow for a small amount of convectional airflow It will result in a reduction of ambient temperature that will improve long term reliability of all equipment mounted within the rack space 2 2 Panel and Rail M...

Page 265: ...ure it is recommended that 1 rack unit of space 1 75 be kept unpopulated and free of equipment above each S20 series product to allow for a small amount of convectional airflow Although forced airflow is not necessary any increase in airflow will result in a reduction of ambient temperature that will improve long term reliability of all equipment mounted within the rack space ...

Page 266: ...ower Supply Connector Terminal Number Description Use 1 L L is connected to the positive cable if the power source is DC or to the phase cable if the power source is AC 2 N N is connected to the negative cable if the Power source is DC or to the neutral cable if the power source is DC 3 Is connected to the grounding safety cable EARTH both for AC and DC sources 4 L L is connected to the positive c...

Page 267: ... cables should not be used for inter building communication since they might be operating in a different current power and may suffer from EMC generated by high voltage equipment Power and data cables should not be run in parallel for long distances and should be installed in separate conduits Power and data cables should intersect at 90 angles when necessary to reduce inductive coupling Shielded ...

Page 268: ...he SFP transceiver unless a user is on the process of inserting or removing of the SFP module Be sure that the user has taken all possible precautions in relation to the electrostatic charge accumulation ESD Disconnect all cables from the SFP module before inserting or removing the module Use only transceivers certified by GE Reason Figure 93 SFP transceiver Before removing the SFP transceiver tak...

Page 269: ...eiver Figure below illustrates the adequate orientation to SFP modules installed both in upper and lower slots When installing the SFP transceivers these shall be inserted with the safety catch locked in position Be sure that the SFP transceivers are completely inserted and that they are locked in position at the end of its insertion Figure 95 Insertion module of the SFP transceiver ...

Page 270: ... supplies as an energy fault or any power sources removal The dry contact connections are illustrated below and insulated flexible wires of 1 5 mm cross section shall be used Figure 96 Failsafe Relay The fail safe works in a combination of three pins in which the pin 2 is the common one When the equipment is healthy contact 2 3 is normally closed contact 2 1 is normally open When the equipment is ...

Page 271: ...Maintenance periods depend on many factors such as The operating environment The Accessibility of the site The amount of available manpower The importance of the installation in the power system The consequences of failure 6 1 Preventive Actions Switches do not fail very often However there is a need for preventive maintenance of switches Periodically switches should be checked for smooth and corr...

Page 272: ...ications Other ports if applicable should be configurable Reason Switches have the capability to send log messages to a dedicate log server The syslog level is divided in 4 categories error severity 3 warning severity 4 notice severity 5 and informational severity 6 When choosing higher severity level the equipment will send all messages from lower levels plus the severity level selected Thus choo...

Page 273: ...ON SWITCHES TM EN 3 273 SNMP versions make sure that SNMP manager can understand all used versions of the protocol The recommended preventive actions described above will help to keep the unit running smoothly an will also avoid any in convenience ...

Page 274: ......

Page 275: ...s allow using its management IP interface as the originator of a ping message Thus it is possible to verify IP hosts reachability from the switch doing basic diagnostics functions in the network Ping menu is located at Diagnostics Ping IP Address This field allows configuring IP address of a host connected to the network in order to verify if it is reachable by switch or not IP address must be typ...

Page 276: ... the user to start the function as follows o Start start the ping messages sending by switch s IP interface 1 2 Link OAM MIB Retrieval menu allows retrieving local or remote MIB variable data on a given switch s port MIB Retrieval menu is located at Diagnostics Link OAM MIB Retrieval o Local select to retrieve local OAM MIB data o Remote select to retrieve remote OAM MIB data o Port indicates whic...

Page 277: ...g packet Allowed values are integer numbers from 2 to 1452 bytes By default ping payload size is 56 bytes Ping Count This field allows configuring how many times ping messages answers and responses should be performed to the address configured below Allowed values are integer numbers from 1 to 60 times By default ping is done 5 times Ping Interval This field allows configuring ping interval from e...

Page 278: ...nction can disturb communication on the port that is being used by this function Thus if using VeriPHY function make sure in the period the function is running there will be no major problem on data loosing Port Select the port that is requested to perform cable inspection by VeriPHY After one of the configurations described before is changed there is a button that allows the user to start the fun...

Page 279: ...e pair represented at this cell is shorted Short Pair can be for pair A B C or D Means that there is a cross pair short at the pair Cross Pair can be for pair A B C or D Means that there is an abnormal cross pair coupling with the pair o o Length column The length in meters of the cable pair 5 meters accuracy ...

Page 280: ...aintenance menu Alternatively a loop between ports 1 and 2 can be created before powering up the equipment to restore the factory default settings Restart Device Restart Device menu is located at Maintenance Restart Device In this menu it is shown a message on the web interface warning if restart is required Allowed buttons are as follows o Yes restart device After clicking this button system will...

Page 281: ...shown buttons to select where is located the file which is the firmware that is required to be installed at the switch and upload it Allowed buttons are as follows o Select File when clicked a window will open allowing selecting firmware file path Select path and file which will be a dat file at the window o Upload after a valid file is selected this button will execute the software upload functio...

Page 282: ...software and date when software was built If alternation of images is required there are buttons that allow doing this task Allowed buttons are as follows o Activate Alternate Image when clicked the alternate software image will become the active image and actual active image will become the alternate Alternate image will remain at the memory but will not be used until it becomes the actual image ...

Page 283: ...ile Startup Config This file contains the configuration the switch will run after it is powered up or restarted If a change in the Running Config was performed and it is requested to maintain the Running Config at the Startup Config the user must save it at the Startup Config at the Save Running Configuration to startup config option at the Maintenance menu Default Config This file contains factor...

Page 284: ...e used as running configuration it is possible to choose to replace running configuration or to merge running config with the configuration uploaded In this last option running config will be maintained and only mismatches between running config and the uploading file will be uploaded To upload a configuration select which configuration is desired to be uploaded and then click at the Upload Config...

Page 285: ... GE Reason Switches REASON SWITCHES TM EN 3 285 To delete configuration select configuration to be deleted and then click at the Delete Configuration File button After this is done configuration file will be deleted of switch s internal memory ...

Page 286: ... that the equipment is operating when equipment do not have any Ethernet connection the LINK LED of port one remains in on state at orange color Thus this LED indicates that switch is powered up and operation system is running properly I do not know switch s management IP address If IP address of the management interface was lost there are some actions that could be done to recover it Major action...

Page 287: ...the switch s management interface If switch responds to PING messages but web interface is not able to open management interface be sure that web browser s proxy usage is properly configured to permit switch s management interface Electrical link is not operating properly If electrical links are not operating properly there are two options to be verified o Link is operating but packets are being l...

Page 288: ...ts or change incoming VLAN ID frames to the VLAN ID of the ingress port thus a given VID frame will be redirected to port VID VLAN o Port Filtering is being respected If ingress filtering is enabled untagged or tagged frames could be dropped depending on the filter configured Be sure that ingress filtering is correct for that port o Egress tagging parameters work as host requires Egress filtering ...

Page 289: ...ating firmware menu is located at the Maintenance menu To update firmware go to the Maintenance Software Upload menu select correct firmware file dat file and then click at the Upload button How can I guarantee that configuration file will not be lost if I reboot the switch When doing configuration changes the first step is to guarantee that new settings are working properly After changing and sav...

Page 290: ...vely by GE In case of equipment malfunction the customer shall get in contact with GE s Contact Centre and never attempt to repair the device by own To request equipment repair service call GE to check out shipment options and receive the technical assistance order code The equipment shall be packed in its original package or a suitable package to protect against impacts and moisture ...

Page 291: ...rs may discharge 6 Disassemble the device by unscrewing the case screws and pulling up the top side of the case after that carry on with the proper repairs Keep in mind that disassembling the equipment may expose sensitive electronic circuitry Take suitable precautions against electrostatic voltage discharge ESD to avoid damage to the equipment After the repairs are done follow the procedure below...

Page 292: ...upply Power supply type 125 250 VDC Input range Nominal AC 110 240 VAC Nominal DC 100 250 VDC Frequency 50 60 Hz 3 Hz Operating Voltage Range 88 264 VAC 90 300 VDC Power Consumption MAX 45 VA Typically 30 W Power supply type 24 48 VDC Input range Nominal DC 24 48 VDC Operating Voltage Range 18 75 VDC ...

Page 293: ...cations REASON SWITCHES TM EN 3 293 2 Failsafe Relay Parameter Value Type of output Dry contact NA and NF Maximum AC Voltage and Current Capacity 250 Vac 2 A Maximum DC Current Capacity 2 A 24 Vdc 2A 48 Vdc 200 mA 125 Vdc 100 mA 250 Vdc max voltage ...

Page 294: ...ASE FX IEEE 802 3z 100BASE SX LX IEEE 802 3ab 1000BASE TX IEEE 802 3x Full duplex operation flow control IEEE 802 1D Media Access Control MAC bridges IEEE 802 1Q VLAN Media Access Control MAC Bridges and Virtual Bridge Local Area Networks IEEE 802 1p Class of service IEEE 1588 v2 IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems ...

Page 295: ...Standard TIA EIA T568A B Auto Crossover Auto Polarity Max Distance 100 m Connector RJ45 Isolation 1 5 kV RMS 1 minute Warning To avoid the risk of electrical shocks when using copper cables the connected cable length shall be less than 3m length and must not extend beyond the cabinet where the product is used Furthermore the equipment connected to both ends of the RJ45 cable shall be connected dir...

Page 296: ...Mbps Model Rate Maximum cable length Wavelength Optical power Sensitivity SFP1GFO05K 1 25 Gbps 0 5 km 850nm 9 3 dBm 17 dBm SFP1GFO10K 1 25 Gbps 10 km 1310nm 9 3 dBm 22 dBm SFP1GFO40K 1 25 Gbps 40 km 1310nm 2 3 dBm 24 dBm SFP1GFO80K 1 25 Gbps 80 km 1550nm 0 5 dBm 24 dBm SFP01GFO2K 155Mbps 2 km 1310nm 15 5 dBm 30 dBm ...

Page 297: ...ons REASON SWITCHES TM EN 3 297 6 Operating Environment Test Standard Level Rationale Cold Test EN 60068 2 1 Operating 40ºC to 55ºC continuously 40º to 70ºC 6h every 24h 40 to 85ºC 96h Storage shipping 40ºC to 85ºC NTP requirements Hot Test EN 60068 2 2 ...

Page 298: ...pecifications GE Reason Switches 298 REASON SWITCHES TM EN 3 7 T1000 Dimensions Parameter Value Dimensions 4 3 cm Height x 43 6 cm Width x 28 6 cm Depth Weight 5 kg Structure 1 mm galvanized steel Figure 97 T1000 dimensions ...

Page 299: ...echnical Specifications REASON SWITCHES TM EN 3 299 8 S2020 and S202G Dimensions Parameter Value Dimensions 4 3 cm Height x 43 6 cm Width x 31 cm Depth Weight 5 kg Structure 1 mm galvanized steel Figure 98 S2020 and S2024G dimensions ...

Page 300: ... 9 Ingress Protection 9 1 Front Mounting Description Value Frontal IP20 Rear IP40 Sides IP20 Product safety protection IP20 9 2 Rear Mounting Description Value Frontal IP40 Rear IP20 Sides IP20 Product safety protection IP20 9 3 Pollution Degree Description Value Pollution Degree II ...

Page 301: ...C 16 6 ms Test level 40 residual voltage Duration time AC 12 cycles DC 200 ms Test level 70 residual voltage Duration time AC 30 cycles DC 500 ms AC and DC voltage interruptions Test level 0 residual voltage Duration time AC 300 cycles DC 5s IEC 61000 4 17 Ripple on DC input power port immunity test Test level 1 of rated DC value Test frequency 120 Hz sinusoidal waveform IEC 61000 4 18 Damped Osci...

Page 302: ...R22 Conducted and radiated emissions Radiated emission Limits 1 to 2 GHz 56 dB μV m average 76 dB μV m peak at 3 m Limits defined by considering the maximum internal frequency of 125 MHz Conducted emission Limits 0 15 to 0 50 MHZ 79 dB μV quasi peak 66 dB μV average 0 5 to 30 MHz 73 dB μV quasi peak 60 dB μV average ...

Reviews: